What is CryptoLocker TA13-309A

CryptoLocker appears in mails, that have been spreading using a fake emails adds designed and it look like a legitimate businesses and through a phony FedEx and UPS tracking notices. In fact, there are reports that some victims saw the malware appeared followed by a previous infection from one of frequently leveraged in the cyber-criminal underground.

CryptoLocker System Infected

TA13-309A Infections:

The malware has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, network file shares and even some cloud storage drives. If one computer on a network becomes infected, mapped network drives could also become infected. CryptoLocker then connects to the attackers’ command and control (C2) server to deposit the asymmetric private encryption key out of the victim’s reach.